In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Regulations, Standards, Negotiating and SLAs, PCI and the Cloud, Evaluating Providers, Incident Response
Private and Hybrid Clouds, IaaS, PaaS, SaaS, Public Clouds
Legacy Applications, Security Services, Networking, IAM, Data Protection, Patching
RubyGems software packaging client was found to have a DNS vulnerability that redirects users to malicious gem servers.
The BlackEnergy malware has evolved from DDoS launching to a crimeware tool to an APT. Learn more about its changes and new defense measures for combatting the threat.
A rootkit was found and you think you've removed it, but how do you confirm it? Enterprise threats expert Nick Lewis explains the next steps to ensure rootkit removal.
Following major breaches at retail giants, government agencies and others, cloud's reputation has taken a hit. But cloud may not be entirely to blame.
The Red Hat cloud strategy is building on popular open source technologies OpenStack and Docker for its IaaS and PaaS offerings.
Many businesses assume open source cloud is cheaper than proprietary models. But that's not always the case, as many costs are often overlooked.
The NSA is about to move some of its IT infrastructure to AWS as it seeks ways to increase efficiency, security and analyze vast amounts of data.
The cloud and its definition are hard to grasp, as each regularly evolves. Vendors continue to push the boundaries of cloud computing with new offerings.
Docker and other container options are gaining popularity. And AWS is diving into the technology, possibly with an eye on native containerization.
Learn steps for moving mobile cloud apps on the right track with development and management.
Learn why you should consider SaaS ALM strategies when designing mobile, Agile and cloud applications.
Learn about five popular APM tools that have added capacity and demand planning to ensure improved user needs.
There are six different types of VMM profiles but not all of them all compatible with the VM and the service templates.
There are no shortages of compelling reasons to virtualize, but some applications present unique licensing challenges.
Red Hat is adding features to its virtualization software to stay competitive, but is also worried about staying relevant as the industry moves to embrace cloud and containers.
With the removal of feature and performance limitations in vCenter Server Appliance in vSphere 6, is it time to switch?
VMware announced its hyper-converged infrastructure offering at VMworld 2014 but has already made some adjustments to the offering.
The vSphere virtualization platform underwent significant renovations in storage and infrastructure management with the 6.0 release. Here's what you need to know.
The European Commission (EC) enacts legislation to end mobile roaming charges and reinforce the principle of a free and open internet across the European Union (EU)
After a week of investigations, Microsoft has been unable to provide an explanation for failure of the Microsoft 365 cloud-based email service used by Parliament
Researchers have found nearly 80% of popular VPN providers leak information about the user because of a vulnerability known as IPv6 leakage